[kernel-sec-discuss] r4171 - active

Ben Hutchings benh at moszumanska.debian.org
Wed Feb 17 23:50:07 UTC 2016


Author: benh
Date: 2016-02-17 23:50:07 +0000 (Wed, 17 Feb 2016)
New Revision: 4171

Modified:
   active/CVE-2015-8812
   active/CVE-2016-0617
   active/CVE-2016-2383
   active/CVE-2016-2384
Log:
Mark issued fixed in 4.4.2-1

Modified: active/CVE-2015-8812
===================================================================
--- active/CVE-2015-8812	2016-02-17 12:26:02 UTC (rev 4170)
+++ active/CVE-2015-8812	2016-02-17 23:50:07 UTC (rev 4171)
@@ -8,7 +8,7 @@
 3.16-upstream-stable: pending (3.16.7-ckt25)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.4.1-1) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
+sid: released (4.4.2-1) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u3) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze20) [bugfix/all/rdma-cxgb3-don-t-free-skbs-on-net_xmit_-indications-.patch, bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]

Modified: active/CVE-2016-0617
===================================================================
--- active/CVE-2016-0617	2016-02-17 12:26:02 UTC (rev 4170)
+++ active/CVE-2016-0617	2016-02-17 23:50:07 UTC (rev 4171)
@@ -5,6 +5,6 @@
 upstream: released (v4.5-rc1) [9aacdd354d197ad64685941b36d28ea20ab88757]
 3.16-upstream-stable: N/A "Introduced by 1bfad99ab42569807d0ca1698449cae5e8c0334a in v4.3-rc1"
 3.2-upstream-stable: N/A "Introduced by 1bfad99ab42569807d0ca1698449cae5e8c0334a in v4.3-rc1"
-sid: pending (4.4.1-1) [bugfix/all/fs-hugetlbfs-inode.c-fix-bugs-in-hugetlb_vmtruncate_.patch]
+sid: released (4.4.2-1) [bugfix/all/fs-hugetlbfs-inode.c-fix-bugs-in-hugetlb_vmtruncate_.patch]
 3.16-jessie-security: N/A "Introduced by 1bfad99ab42569807d0ca1698449cae5e8c0334a in v4.3-rc1"
 3.2-wheezy-security: N/A "Introduced by 1bfad99ab42569807d0ca1698449cae5e8c0334a in v4.3-rc1"

Modified: active/CVE-2016-2383
===================================================================
--- active/CVE-2016-2383	2016-02-17 12:26:02 UTC (rev 4170)
+++ active/CVE-2016-2383	2016-02-17 23:50:07 UTC (rev 4171)
@@ -7,6 +7,6 @@
 upstream: released (4.5-rc4) [a1b14d27ed0965838350f1377ff97c93ee383492]
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.4.1-1) [bugfix/all/bpf-fix-branch-offset-adjustment-on-backjumps-after-.patch]
+sid: released (4.4.2-1) [bugfix/all/bpf-fix-branch-offset-adjustment-on-backjumps-after-.patch]
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-2384
===================================================================
--- active/CVE-2016-2384	2016-02-17 12:26:02 UTC (rev 4170)
+++ active/CVE-2016-2384	2016-02-17 23:50:07 UTC (rev 4171)
@@ -6,7 +6,7 @@
 3.16-upstream-stable: pending (3.16.7-ckt25)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.4.1-1) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
+sid: released (4.4.2-1) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u3) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze20) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]




More information about the kernel-sec-discuss mailing list